Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
18-05-2024 09:29
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5410aae3341aab5080201f8548105afb_JaffaCakes118.exe
Resource
win7-20240508-en
windows7-x64
7 signatures
150 seconds
General
-
Target
5410aae3341aab5080201f8548105afb_JaffaCakes118.exe
-
Size
92KB
-
MD5
5410aae3341aab5080201f8548105afb
-
SHA1
199429f99acfa967a4ce0577ee0ef86c2aaac91c
-
SHA256
66776cbc22a9d3b3254b9e6ec66dc3d42e5bf1ac68ac5852fe0381547b44a9f4
-
SHA512
3d46de84f9cf4e346a467323b4bcfb72b2100af0edb25cb6829226cd2f0625f3f412064abe05e65a3321698071bc5ffdbce79e655777de827f6ee0f0db867d78
-
SSDEEP
1536:bUi5RtlGF5QAFsX3zbfKWWUy1neTGSxRgqMaohOaq3vr/zz:4ke9FsHzbfWTeTGSXgIohOaq3T/zz
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
eventvideo.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat eventvideo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 21 IoCs
Processes:
eventvideo.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9}\WpadDecision = "0" eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-f7-ef-12-bd-5b eventvideo.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-f7-ef-12-bd-5b\WpadDecisionReason = "1" eventvideo.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" eventvideo.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9}\46-f7-ef-12-bd-5b eventvideo.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" eventvideo.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9}\WpadNetworkName = "Network 3" eventvideo.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings eventvideo.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9} eventvideo.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9}\WpadDecisionReason = "1" eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections eventvideo.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eventvideo.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-f7-ef-12-bd-5b\WpadDecision = "0" eventvideo.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1FB8A42F-EB9A-4AA7-8DEC-BDC0879369E9}\WpadDecisionTime = 30277fe905a9da01 eventvideo.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\46-f7-ef-12-bd-5b\WpadDecisionTime = 30277fe905a9da01 eventvideo.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings eventvideo.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f009d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 eventvideo.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
eventvideo.exepid process 2580 eventvideo.exe 2580 eventvideo.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
5410aae3341aab5080201f8548105afb_JaffaCakes118.exepid process 2964 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5410aae3341aab5080201f8548105afb_JaffaCakes118.exeeventvideo.exedescription pid process target process PID 1636 wrote to memory of 2964 1636 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe PID 1636 wrote to memory of 2964 1636 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe PID 1636 wrote to memory of 2964 1636 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe PID 1636 wrote to memory of 2964 1636 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe 5410aae3341aab5080201f8548105afb_JaffaCakes118.exe PID 3036 wrote to memory of 2580 3036 eventvideo.exe eventvideo.exe PID 3036 wrote to memory of 2580 3036 eventvideo.exe eventvideo.exe PID 3036 wrote to memory of 2580 3036 eventvideo.exe eventvideo.exe PID 3036 wrote to memory of 2580 3036 eventvideo.exe eventvideo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5410aae3341aab5080201f8548105afb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5410aae3341aab5080201f8548105afb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\5410aae3341aab5080201f8548105afb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5410aae3341aab5080201f8548105afb_JaffaCakes118.exe"2⤵
- Suspicious behavior: RenamesItself
PID:2964
-
C:\Windows\SysWOW64\eventvideo.exeC:\Windows\SysWOW64\eventvideo.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\eventvideo.exe"C:\Windows\SysWOW64\eventvideo.exe"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2580